Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification

04/28/2021
by   Domenico Cotroneo, et al.
0

Virtualization technology is nowadays adopted in security-critical embedded systems to achieve higher performance and more design flexibility. However, it also comes with new security threats, where attackers leverage timing covert channels to exfiltrate sensitive information from a partition using a trojan. This paper presents a novel approach for the experimental assessment of timing covert channels in embedded hypervisors, with a case study on security assessment of a commercial hypervisor product (Wind River VxWorks MILS), in cooperation with a licensed laboratory for the Common Criteria security certification. Our experimental analysis shows that it is indeed possible to establish a timing covert channel, and that the approach is useful for system designers for assessing that their configuration is robust against this kind of information leakage.

READ FULL TEXT
research
04/27/2015

Deterministically Deterring Timing Attacks in Deterland

The massive parallelism and resource sharing embodying today's cloud bus...
research
02/25/2020

PASCAL: Timing SCA Resistant Design and Verification Flow

A large number of crypto accelerators are being deployed with the widesp...
research
04/05/2018

Timing Channel in IaaS: How to Identify and Investigate

Recently, the IaaS (Infrastructure as a Service) Cloud (e.g., Amazon EC2...
research
01/24/2019

Can We Prove Time Protection?

Timing channels are a significant and growing security threat in compute...
research
06/26/2019

Security Rating Metrics for Distributed Wireless Systems

The paper examines quantitative assessment of wireless distribution syst...
research
07/25/2023

Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

Side-channel attacks pose significant challenges to the security of embe...
research
09/14/2023

WASM-MUTATE: Fast and Effective Binary Diversification for WebAssembly

WebAssembly has is renowned for its efficiency and security in browser e...

Please sign up or login with your details

Forgot password? Click here to reset